Sciweavers

8614 search results - page 1463 / 1723
» Mining
Sort
View
113
Voted
ICSE
2007
IEEE-ACM
16 years 3 months ago
Path-Sensitive Inference of Function Precedence Protocols
Function precedence protocols define ordering relations among function calls in a program. In some instances, precedence protocols are well-understood (e.g., a call to pthread mut...
Murali Krishna Ramanathan, Ananth Grama, Suresh Ja...
127
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Formal concept analysis applied to fault localization
One time-consuming task in the development of software is debugging. Recent work in fault localization crosschecks traces of correct and failing execution traces, it implicitly se...
Peggy Cellier
114
Voted
ICDE
2010
IEEE
199views Database» more  ICDE 2010»
16 years 3 months ago
Fuzzy Matching of Web Queries to Structured Data
Recognizing the alternative ways people use to reference an entity, is important for many Web applications that query structured data. In such applications, there is often a mismat...
Tao Cheng, Hady Wirawan Lauw, Stelios Paparizos
ICDE
2010
IEEE
260views Database» more  ICDE 2010»
16 years 3 months ago
Anonymizing Weighted Social Network Graphs
The increasing popularity of social networks has initiated a fertile research area in information extraction and data mining. Although such analysis can facilitate better understan...
Sudipto Das, Ömer Egecioglu, Amr El Abbadi
PERCOM
2005
ACM
16 years 3 months ago
Adaptive Temporal Radio Maps for Indoor Location Estimation
In this paper, we present a novel method to adapt the temporal radio maps for indoor location determination by offsetting the variational environmental factors using data mining t...
Jie Yin, Qiang Yang, Lionel M. Ni
« Prev « First page 1463 / 1723 Last » Next »